Sökning: "Ethical hacking"

Visar resultat 6 - 10 av 63 uppsatser innehållade orden Ethical hacking.

  1. 6. Penetration testing of current smart thermostats : Threat modeling and security evaluation of Shelly TRV and Meross Smart Thermostat

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Adam Lindberg; [2023]
    Nyckelord :IoT penetration testing; Smart thermostat; Ethical hacking; PatrIoT; Cybersecurity; IoT penetrationstestning; Smart termostat; Etisk hackning; PatrIoT; Cybersäkerhet;

    Sammanfattning : As smart homes become increasingly common and concerns over Internet of Things (IoT) security grow, this study delves into the vulnerabilities of smart thermostats. These devices offer convenience but also comes with increased risk of cyber attacks. LÄS MER

  2. 7. An Attribution Method for Alerts in an Educational Cyber Range based on Graph Database

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Yang Wang; [2023]
    Nyckelord :Network Attribution. Cyber Range; Ethical Hacking Course. Graph Database.; Nätverksattribuering; Cyberområde; Etisk Hackningskurs; Grafisk Databas;

    Sammanfattning : Finding the source of events in a network is a critical problem in network security, and this process is called network attribution. This thesis develops a system to attribute alerts from the cyber range of the Ethical Hacking Course at KTH to students. The cyber range is an essential component of the Ethical Hacking course. LÄS MER

  3. 8. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Johan Henning; [2023]
    Nyckelord :Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Sammanfattning : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. LÄS MER

  4. 9. Penetration testing of a smart speaker

    Kandidat-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Amin Nouiser; [2023]
    Nyckelord :Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Sammanfattning : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. LÄS MER

  5. 10. Underneath the Surface : Threat modeling and penetration testing of a submarine robot

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Niklas Vatn; [2023]
    Nyckelord :Security; Ethical Hacking; Threat Modeling; IoT; Autonomous Underwater Vehicles; Säkerhet; Etisk Hackning; Hotmodelling; IoT; Autonoma Undervattensrobotar;

    Sammanfattning : Connected devices have become an integral part of life in modern society. In the industry, several tasks have been automatized and are now performed by robots, a development that is called Industry 4.0. LÄS MER